Back to blog

7-Year Malicious Campaign Installed Backdoor in Millions of Chrome and Edge Extensions

Hello HaWkers, an alarming discovery was revealed this week in the digital security world. Researchers identified a malicious campaign that operated for 7 years, compromising popular Chrome and Edge extensions with backdoors that potentially affected millions of users.

How many extensions do you have installed in your browser right now? And how many of them did you actually check before installing? This type of attack shows how even tools we consider safe can be threat vectors.

The Discovery

The campaign was recently exposed by security researchers who identified a sophisticated pattern of browser extension compromise. The attack operated silently since 2018, going undetected by all extension store security mechanisms.

How the Attack Worked

The scheme followed a well-structured pattern:

Phase 1: Acquisition

Attackers identified popular extensions whose original developers had lost interest or were willing to sell. Extensions with hundreds of thousands of users were preferred targets.

Phase 2: Malicious Update

After acquiring the extension, an update was released containing obfuscated malicious code. Since users already trusted the extension, the update was installed automatically.

Phase 3: Persistence

The backdoor was designed to be extremely discreet, activating only under specific conditions to avoid detection by security tools and code analysis.

Phase 4: Exfiltration

Once active, the malware could:

  • Steal session cookies
  • Intercept credentials
  • Inject fraudulent ads
  • Redirect traffic
  • Collect browsing data

Scale of the Problem

Alarming Numbers

The campaign compromised dozens of extensions, including some with:

  • Over 1 million active installations
  • Positive ratings of 4.5+ stars
  • Years of "clean" history

Most affected categories:

Category Risk
Free VPNs High
Download managers High
Page modifiers Medium
Productivity tools Medium
Themes and customization Low to Medium

Why It Lasted So Long

Several factors allowed the campaign to operate for 7 years:

Sophisticated obfuscation

The malicious code was highly obfuscated and fragmented, making detection by static analysis difficult.

Conditional activation

The backdoor was only activated after an "incubation" period and only under certain geographic and usage conditions.

Distributed infrastructure

The command and control (C2) servers used domains that rotated frequently and blended with legitimate traffic.

Reputation purchase

By acquiring already established extensions, attackers inherited all the trust built by the original developer.

How to Check If You Were Affected

Step 1: Review Installed Extensions

In Chrome, go to chrome://extensions/ and in Edge, go to edge://extensions/.

Check:

  • Last update date for each extension
  • If the developer changed recently
  • Permissions requested by the extension

Step 2: Check for Excessive Permissions

Be suspicious of extensions that ask for:

- Read and modify all data on all sites
- Manage downloads
- Modify data sent to servers
- Access tabs and windows

If a themes extension asks for access to all your browsing data, something is wrong.

Step 3: Use Analysis Tools

There are tools that can help identify potentially malicious extensions:

CRXcavator (for Chrome)

Service that analyzes Chrome extensions and provides risk scores based on permissions and behavior.

Extension Police

Extension that monitors changes in other extensions and alerts about suspicious updates.

Step 4: Monitor Network Traffic

For more technical users, monitoring browser network traffic can reveal suspicious communications:

# Linux/macOS - Monitor Chrome connections
lsof -i -n | grep -i chrome

# Windows PowerShell
Get-NetTCPConnection | Where-Object {$_.OwningProcess -eq (Get-Process chrome).Id}

Security Best Practices For Extensions

Before Installing

1. Verify the developer

Research who is behind the extension. Known developers and established companies are more reliable.

2. Analyze permissions

Only install extensions that ask for the minimum permissions necessary to function.

3. Check recent reviews

Old reviews may not reflect the current state of the extension. Focus on comments from recent months.

4. Prefer open source extensions

Open code allows the community to audit security.

After Installing

1. Keep few extensions

The fewer extensions, the smaller the attack surface.

2. Disable when not using

Extensions you rarely use can be disabled and activated only when needed.

3. Review periodically

Every few months, review your extensions and remove ones you no longer use.

Company Response

Google

Google removed the identified extensions from the Chrome Web Store and is working on improvements to review processes:

  • More rigorous analysis of updates for extensions that change ownership
  • Machine learning to detect suspicious behavior
  • Monitoring of extension network communications

Microsoft

Microsoft also took similar actions on the Edge Add-ons store and is implementing:

  • Additional checks for extensions that request sensitive permissions
  • Better tracking of ownership changes
  • Closer collaboration with security researchers

The Extension Ecosystem Needs to Change

Structural Problems

This incident exposes fundamental problems in the current extension distribution model:

Opaque ownership transfer

When an extension changes owners, users are not notified. This allows attackers to buy extensions and turn them into malware.

Automatic updates without review

Extensions can be automatically updated without security review proportional to the number of affected users.

Overly broad permissions

The current permission model is too binary. An extension either has or does not have access to data - there are no intermediate levels.

Proposed Solutions

Researchers and security experts suggest:

Manifest V3

The new version of Chrome's extension manifest already limits some dangerous capabilities, but the transition is slow and controversial.

Ownership change notification

Users should be notified and have the option to review extensions that change developers.

More restrictive sandbox

Extensions should operate in more isolated environments, with granular access only to what they actually need.

Lessons For Developers

If you develop browser extensions, this incident offers important lessons:

Supply Chain Security

Protect your credentials

Developer accounts are valuable targets. Use multi-factor authentication and strong passwords.

Audit dependencies

Extensions using third-party libraries can be compromised indirectly.

Monitor access

Watch for unauthorized access attempts to your developer account.

If You Decide to Sell

If you decide to sell or transfer an extension:

  • Consider the impact on users
  • Verify the buyer's reputation
  • Be transparent with the community about the transfer

Conclusion

The 7-year backdoor campaign in extensions is a stark reminder that digital security requires constant vigilance. Even tools we use daily and consider safe can be compromised.

For users, the recommendation is clear: review your extensions, remove unnecessary ones, and be careful before installing new ones. For developers and technology companies, it is time to rethink how the extension ecosystem works.

If you want to learn more about security in web development, I recommend checking out the article Critical Vulnerability in React and Next.js Allows Remote Code Execution where we discuss another recent threat and how to protect yourself.

Let's go! 🦅

📚 Want to Deepen Your JavaScript Knowledge?

This article covered a critical security topic, but there is much more to learn about secure and modern development.

Developers who invest in solid, structured knowledge tend to have more opportunities in the market.

Complete Study Material

If you want to master JavaScript from basics to advanced, I have prepared a complete guide:

Investment options:

  • 1x of $4.90 on card
  • or $4.90 at sight

👉 Learn About JavaScript Guide

💡 Material updated with industry best practices

Comments (0)

This article has no comments yet 😢. Be the first! 🚀🦅

Add comments